pwnedlabs 38
- Reveal Hidden Files in Google Storage
- Pivot Through Service Accounts using Dangerous Permissions
- Leverage Google Workspace for GCP Resource Access
- Infiltrate GCP via WebApp Exploitation
- Impersonate GCP Service Account for Privileged Access
- Illuminate GCP by Fuzzing IAM Permissions
- Gain Entry to GCP via GitLab Commit
- Exploit SSRF with Gopher for GCP Initial Access
- Escalate GCP privileges with Implicit Delegation
- Unmask Privileged Access In Azure
- Unlock Access with Azure Key Vault
- Phished for Initial Access
- Passwordless Credentials for Access and Escalation
- Loot Exchange, Teams and SharePoint with GraphRunner
- Leverage Device Code Phishing for Initial Access
- Intro to Azure Recon with BloodHound
- Exploit SQL Injection in Azure Function App
- Execute Azure Credential Shuffle to Achieve Objectives
- Bypass Azure Web App Authentication with Path Traversal
- Bypass Azure MFA with Evilginx
- Azure Recon to Foothold and Profit
- Azure Blob Container to Initial Access
- Abuse Dynamic Groups in Entra ID for Privilege Escalation
- Unauthenticated AWS IAM Principals Enumeration
- SSRF to Pwned
- Pwn TeamCity in the Cloud
- Prevent Breaches with AWS IAM Access Analyzer
- Loot Public EBS Snapshots
- Intro to AWS IAM Enumeration
- AWS S3 Enumeration Basics
- Identify IAM Breaches with CloudTrail and Athena
- Hunt for Secrets in Git Repos
- Exploit Jenkins in the Cloud
- Escalate Privileges by IAM Policy Rollback
- Bypass Restrictions in API Gateway
- AWS S3 Enumeration Basics
- Assume Privileged Role with External ID
- Abuse OpenID Connect and GitLab for AWS Access